CVE-2025-61884

7.5 HIGH CISA KEV

📋 TL;DR

This is a path traversal vulnerability (CWE-22) in Oracle Configurator within Oracle E-Business Suite that allows unauthenticated attackers to access sensitive data via HTTP. It affects Oracle E-Business Suite versions 12.2.3 through 12.2.14. Attackers can read critical configuration files and database credentials without authentication.

💻 Affected Systems

Products:
  • Oracle E-Business Suite
Versions: 12.2.3-12.2.14
Operating Systems: All supported platforms for Oracle E-Business Suite
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Runtime UI component of Oracle Configurator. All installations within the affected version range are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Oracle Configurator data including sensitive business information, customer data, and database credentials leading to full system compromise.

🟠

Likely Case

Unauthorized access to configuration files, database connection strings, and sensitive business data stored in the Configurator component.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details and proof-of-concept are publicly available. CISA has added this to their Known Exploited Vulnerabilities catalog.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply July 2025 Critical Patch Update (CPU)

Vendor Advisory: https://www.oracle.com/security-alerts/alert-cve-2025-61884.html

Restart Required: Yes

Instructions:

1. Download the July 2025 Critical Patch Update from Oracle Support. 2. Apply the patch following Oracle's patching procedures. 3. Restart affected Oracle E-Business Suite services. 4. Verify the patch application.

🔧 Temporary Workarounds

Network Access Restriction

all

Block external HTTP access to Oracle Configurator endpoints

iptables -A INPUT -p tcp --dport 8000 -s 0.0.0.0/0 -j DROP
netsh advfirewall firewall add rule name="Block Oracle Configurator" dir=in action=block protocol=TCP localport=8000

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Oracle E-Business Suite from untrusted networks
  • Deploy web application firewall (WAF) with path traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Check Oracle E-Business Suite version and verify if within affected range 12.2.3-12.2.14

Check Version:

SELECT RELEASE_NAME FROM FND_PRODUCT_GROUPS;

Verify Fix Applied:

Verify July 2025 CPU patch is applied and check version is no longer in vulnerable range

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in Oracle logs
  • HTTP requests with ../ sequences to Configurator endpoints
  • Failed authentication attempts followed by successful data access

Network Indicators:

  • HTTP requests containing path traversal sequences (../, ..\) to Oracle Configurator URLs
  • Unusual data exfiltration from Oracle E-Business Suite systems

SIEM Query:

source="oracle_ebs" AND (uri="*../*" OR uri="*..\\*") AND dest_port=8000

🔗 References

📤 Share & Export